Environmental impacts as buying criteria for third party logistical services C Wolf, S Seuring
International Journal of Physical Distribution & Logistics Management, 2010
343 2010 Mobile security catching up? revealing the nuts and bolts of the security of mobile devices M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
306 2011 Quantifying the security of graphical passwords: The case of android unlock patterns S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
247 2013 Taxonomy of public key schemes based on the problem of multivariate quadratic equations C Wolf, B Preneel
Cryptology ePrint Archive, 2005
181 2005 Continuous authentication on mobile devices by analysis of typing motion behavior H Gascon, S Uellenbeck, C Wolf, K Rieck
Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 2014
142 2014 Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? A Bogdanov, T Eisenbarth, A Rupp, C Wolf
International workshop on cryptographic hardware and embedded systems, 45-61, 2008
103 2008 A study of the security of Unbalanced Oil and Vinegar signature schemes A Braeken, C Wolf, B Preneel
Cryptographers’ Track at the RSA Conference, 29-43, 2005
98 2005 Solving underdetermined systems of multivariate quadratic equations revisited E Thomae, C Wolf
International Workshop on Public Key Cryptography, 156-171, 2012
97 2012 Multivariate quadratic polynomials in public key cryptography C Wolf
Katholieke Universiteit Leuven, 2005
95 2005 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
84 2006 Efficient cryptanalysis of rse (2) pkc and rsse (2) pkc C Wolf, A Braeken, B Preneel
International Conference on Security in Communication Networks, 294-309, 2004
83 2004 ℓ-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
76 2007 Large Superfluous Keys in ultivariate uadratic Asymmetric Systems C Wolf, B Preneel
International Workshop on Public Key Cryptography, 275-287, 2005
67 2005 Equivalent keys in HFE, C*, and variations C Wolf, B Preneel
International Conference on Cryptology in Malaysia, 33-49, 2005
51 2005 The Belgian Electronic Identity Card (Overview). D De Cock, C Wolf, B Preneel
Sicherheit 77, 298-301, 2006
38 2006 Small Public Keys and Fast Verification for ultivariate uadratic Public Key Systems A Petzoldt, E Thomae, S Bulygin, C Wolf
International Workshop on Cryptographic Hardware and Embedded Systems, 475-490, 2011
37 2011 Equivalent keys in ℳultivariate uadratic public key systems C Wolf, B Preneel
Journal of Mathematical Cryptology 4 (4), 375-415, 2011
36 2011 Cryptanalysis of enhanced TTS, STS and all its variants, or: Why cross-terms are important E Thomae, C Wolf
International Conference on Cryptology in Africa, 188-202, 2012
31 2012 On the security of stepwise triangular systems C Wolf, A Braeken, B Preneel
Designs, Codes and Cryptography 40 (3), 285-302, 2006
30 2006 Asymmetric cryptography: Hidden field equations C Wolf, B Preneel
Cryptology ePrint Archive, 2004
29 2004